Learn about AI, IoT, CyberSec & Blockchain “With The Best” Online Conferences

We should never stop learning. Of course, it’s good to stay on top of new things via articles and social

Read more

What the WannaCry Worm Means for You

May 15 — A relatively common type of ransom-demanding malware worm called WannaCrypt blew across the Internet on Friday. By using

Read more

InfoSec Risk: Every USB Giveaway Could Be Your Peril

Did you ever get a free USB flash drive? USB fan, LED light, Wifi adapter, mouse, keyboard, dongle, or a

Read more

Style Consultant AI: Benefits and Risks of Using Echo Look

Most gadgets are firmly aimed at the male market. Sure phones come in rose gold and a few other feminine

Read more

One New Year’s Resolution Meets IT Challenges of 2017

Happy New Year everyone. Here’s to hoping you’re all ready to tackle the challenges 2017 has in store. This is

Read more

Kristin Montag: 4 Approaches to Mobile App Management [Video]

Managing apps and managing what they are allowed to do, is not only relevant in large enterprises anymore. Even for

Read more

Secucloud Offers Personal Cybersecurity in the Age of IoT

German cybersecurity startup Secucloud, hailing from Hamburg, has successfully completed their third crowdfunding seeding project in April. Their solutions are

Read more

The Role of Cybersecurity in Brazil’s WhatsApp Ban

Cybersecurity has been a constant topic in recent news, with recent incidents including the San Bernardino Apple-FBI battle and Romanian

Read more

Hortonworks Provides Open Data Solution for Cybersecurity Operations

On the 12th of April Hortonworks announced to put a strategic focus on open cybersecurity and talked about the solution

Read more

Enterprise YOLO and Working Like You Don’t Give a Damn

In this article we are going to analyze the YOLO (You Only Live Once) lifestyle and find out if this

Read more

Mobile Cyber Security: Minimizing Loss and Maximizing Profit

According to the Symantec Internet Security Report, the known number of times that computer security is penetrated is 34,529… per

Read more

Methodologies for IT Service Management and Project Management

I’m a big fan of standard practices, common ground and professional methodologies, that help me to help organizations achieving their

Read more

RESILIA: When InfoSec Meets ITSM

I have recently completed an online course at the University of Adelaide that was named ‘Cyberwar, Surveillance and Security’. I

Read more